Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
51c4ea5adbb81cb2211c210af6bf0f40N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
51c4ea5adbb81cb2211c210af6bf0f40N.exe
Resource
win10v2004-20240802-en
General
-
Target
51c4ea5adbb81cb2211c210af6bf0f40N.exe
-
Size
88KB
-
MD5
51c4ea5adbb81cb2211c210af6bf0f40
-
SHA1
d6933fdf54772b2e91cb77450579228fa1f98951
-
SHA256
49b2868d687fa4c2f8df75e4b452f9aca4a5073d44dd1bfd001d8f0888c6bad4
-
SHA512
2913a67ca5841cfc12650a738cf6eb1669eab7acafdac3dfde8821b2b97bb81b0bd9b844dddceaa03a02dac71c62ee3e47805ade0391e07965d666a8be53eeba
-
SSDEEP
768:5vw9816thKQLrov4/wQkNrfrunMxVFA3V:lEG/0ovlbunMxVS3V
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A103668-3A02-43da-9200-6E08599B61C6} {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}\stubpath = "C:\\Windows\\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe" {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F52C8E5-A887-4cf4-803F-0053CA9DB330} {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}\stubpath = "C:\\Windows\\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe" {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2ACD2921-B4B5-4dd9-92F0-3423CD773107} {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{96B3CE1A-A363-4e10-BF2D-7423911B6838} 51c4ea5adbb81cb2211c210af6bf0f40N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5} {1A103668-3A02-43da-9200-6E08599B61C6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{066A1381-6D85-4481-897C-3A53BA389ED4}\stubpath = "C:\\Windows\\{066A1381-6D85-4481-897C-3A53BA389ED4}.exe" {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0} {066A1381-6D85-4481-897C-3A53BA389ED4}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}\stubpath = "C:\\Windows\\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe" {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1A103668-3A02-43da-9200-6E08599B61C6}\stubpath = "C:\\Windows\\{1A103668-3A02-43da-9200-6E08599B61C6}.exe" {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}\stubpath = "C:\\Windows\\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe" {1A103668-3A02-43da-9200-6E08599B61C6}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF} {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{96B3CE1A-A363-4e10-BF2D-7423911B6838}\stubpath = "C:\\Windows\\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe" 51c4ea5adbb81cb2211c210af6bf0f40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C8BB2923-928C-485c-95E3-6F1828C76D70}\stubpath = "C:\\Windows\\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exe" {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{066A1381-6D85-4481-897C-3A53BA389ED4} {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}\stubpath = "C:\\Windows\\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe" {066A1381-6D85-4481-897C-3A53BA389ED4}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C8BB2923-928C-485c-95E3-6F1828C76D70} {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe -
Executes dropped EXE 9 IoCs
pid Process 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 2108 {2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exe {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe File created C:\Windows\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe File created C:\Windows\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe File created C:\Windows\{066A1381-6D85-4481-897C-3A53BA389ED4}.exe {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe File created C:\Windows\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe {066A1381-6D85-4481-897C-3A53BA389ED4}.exe File created C:\Windows\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe File created C:\Windows\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 51c4ea5adbb81cb2211c210af6bf0f40N.exe File created C:\Windows\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe {1A103668-3A02-43da-9200-6E08599B61C6}.exe File created C:\Windows\{1A103668-3A02-43da-9200-6E08599B61C6}.exe {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51c4ea5adbb81cb2211c210af6bf0f40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {1A103668-3A02-43da-9200-6E08599B61C6}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {066A1381-6D85-4481-897C-3A53BA389ED4}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language {2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe Token: SeIncBasePriorityPrivilege 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe Token: SeIncBasePriorityPrivilege 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe Token: SeIncBasePriorityPrivilege 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe Token: SeIncBasePriorityPrivilege 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe Token: SeIncBasePriorityPrivilege 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe Token: SeIncBasePriorityPrivilege 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe Token: SeIncBasePriorityPrivilege 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe Token: SeIncBasePriorityPrivilege 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4772 wrote to memory of 456 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe 95 PID 4772 wrote to memory of 456 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe 95 PID 4772 wrote to memory of 456 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe 95 PID 4772 wrote to memory of 3992 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe 96 PID 4772 wrote to memory of 3992 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe 96 PID 4772 wrote to memory of 3992 4772 51c4ea5adbb81cb2211c210af6bf0f40N.exe 96 PID 456 wrote to memory of 1384 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 97 PID 456 wrote to memory of 1384 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 97 PID 456 wrote to memory of 1384 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 97 PID 456 wrote to memory of 1692 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 98 PID 456 wrote to memory of 1692 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 98 PID 456 wrote to memory of 1692 456 {96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe 98 PID 1384 wrote to memory of 4780 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 102 PID 1384 wrote to memory of 4780 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 102 PID 1384 wrote to memory of 4780 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 102 PID 1384 wrote to memory of 552 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 103 PID 1384 wrote to memory of 552 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 103 PID 1384 wrote to memory of 552 1384 {1A103668-3A02-43da-9200-6E08599B61C6}.exe 103 PID 4780 wrote to memory of 516 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 104 PID 4780 wrote to memory of 516 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 104 PID 4780 wrote to memory of 516 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 104 PID 4780 wrote to memory of 2560 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 105 PID 4780 wrote to memory of 2560 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 105 PID 4780 wrote to memory of 2560 4780 {B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe 105 PID 516 wrote to memory of 4152 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 106 PID 516 wrote to memory of 4152 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 106 PID 516 wrote to memory of 4152 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 106 PID 516 wrote to memory of 808 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 107 PID 516 wrote to memory of 808 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 107 PID 516 wrote to memory of 808 516 {C8BB2923-928C-485c-95E3-6F1828C76D70}.exe 107 PID 4152 wrote to memory of 2796 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 109 PID 4152 wrote to memory of 2796 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 109 PID 4152 wrote to memory of 2796 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 109 PID 4152 wrote to memory of 4820 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 110 PID 4152 wrote to memory of 4820 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 110 PID 4152 wrote to memory of 4820 4152 {A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe 110 PID 2796 wrote to memory of 2068 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 111 PID 2796 wrote to memory of 2068 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 111 PID 2796 wrote to memory of 2068 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 111 PID 2796 wrote to memory of 2264 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 112 PID 2796 wrote to memory of 2264 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 112 PID 2796 wrote to memory of 2264 2796 {3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe 112 PID 2068 wrote to memory of 452 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 113 PID 2068 wrote to memory of 452 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 113 PID 2068 wrote to memory of 452 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 113 PID 2068 wrote to memory of 4884 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 114 PID 2068 wrote to memory of 4884 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 114 PID 2068 wrote to memory of 4884 2068 {066A1381-6D85-4481-897C-3A53BA389ED4}.exe 114 PID 452 wrote to memory of 2108 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 119 PID 452 wrote to memory of 2108 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 119 PID 452 wrote to memory of 2108 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 119 PID 452 wrote to memory of 3408 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 120 PID 452 wrote to memory of 3408 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 120 PID 452 wrote to memory of 3408 452 {4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c4ea5adbb81cb2211c210af6bf0f40N.exe"C:\Users\Admin\AppData\Local\Temp\51c4ea5adbb81cb2211c210af6bf0f40N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exeC:\Windows\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\{1A103668-3A02-43da-9200-6E08599B61C6}.exeC:\Windows\{1A103668-3A02-43da-9200-6E08599B61C6}.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exeC:\Windows\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exeC:\Windows\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exeC:\Windows\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exeC:\Windows\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\{066A1381-6D85-4481-897C-3A53BA389ED4}.exeC:\Windows\{066A1381-6D85-4481-897C-3A53BA389ED4}.exe8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exeC:\Windows\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exeC:\Windows\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4FC4A~1.EXE > nul10⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{066A1~1.EXE > nul9⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3F52C~1.EXE > nul8⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7CF0~1.EXE > nul7⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C8BB2~1.EXE > nul6⤵
- System Location Discovery: System Language Discovery
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B58B3~1.EXE > nul5⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{1A103~1.EXE > nul4⤵
- System Location Discovery: System Language Discovery
PID:552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{96B3C~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\51C4EA~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e64fb706053fd262ea55ffb6f8b6c5bd
SHA1b03865461367776d67151be60ef157a3892f6612
SHA2561cce08cdcfeaf360083d560dca2b51ec523d459152fb694d406598fb1e11f32c
SHA512ce08e024dd56755d289295d8128584a75896e9b8eeaefb9b73b6a5a9d3e7fa95b3b0a4033ea07c89efe5136127b04e228fae34307872884f195c76dc8271a403
-
Filesize
88KB
MD5d02d57d560bcc21630853474ec7510f8
SHA1c728f67239a522b596517bf79832aba000ec90d6
SHA2566f4e42e31a99354ef4a634edab0d9e6347f9fe1c8ca4281ff39bb4d4d8210da6
SHA512ab42ef6fab23f1fd9f6c76ec6648097f6581538bf2a2399dd7140c6635656fe7a09c24f7d58ec82f10f335bcdd3273d7af0ca519b63c4ac5672e2c1301501d25
-
Filesize
88KB
MD5ac86798b08a0ba336542b138184e6e2b
SHA1781a31dbd50bbb0fc048fa27771e914f94332bff
SHA25634f7c71ea37e62faf30165d93643713fe8f05399bc9506204513f05f08226b69
SHA5123ea9709cd90964d2933a839cd42e9135f3e39e84fbbb565f1ce678b51c027d7f1741360859f127eb2aacfaed38f0276817ee13c3224881c802ae012f7e207e18
-
Filesize
88KB
MD5c6a9fc41fa55cc3a7f59a0b48a500c8b
SHA1c8d5dc42405f48497dc7a5698a31faafce33e001
SHA2569c10ab9148074a2574c8abb305ba411ce70118bf101a8349507b75c6b76acc51
SHA512ec8e8f245663290a4a424014d278163452ba5bfce29f2155ef220bd41025e5c44bd76edbf1d72919e3b88fd03980f76f783f7e614f7fbe4a1f201c59da28cf84
-
Filesize
88KB
MD5fb2686d239e9f8a3945f9bef34772637
SHA1082a4706a1ad0f134d81e1961208ff62fdbd47ca
SHA25624ae3e1f6162857972a7f9bbca22d5dd532d7839cff60b0dd342d8b077573fab
SHA512694e14078709eb7886b3d4a0232a179ab26684a94549a5175b21021346a4ca4f6af0da672f127d32c44df54c8fffe1d4b1d7f6c9e1152f1ed5c63e0d7f75e972
-
Filesize
88KB
MD5c397ff4e716f596efe14305820dbbcf4
SHA1c73de23abac96aa62c56857521a12ee25ae12f02
SHA2568c68b547ac3237ef29c307491db6fc2f1da9588d0d44c84a5bebadcc151357cc
SHA51268734dfe1b88f1b5bb938fdcae09f31ca1982839e7064ea691a911c5b541aac45d0668b9f81bc92f8abd7face93c4fb1e3d67dbb04d18bc4b7b285dabbba8196
-
Filesize
88KB
MD5fda6e433a65b89599d74e8e799b0acd7
SHA17bf353ac612bf6db0b5a64b1cf05ade47f23efe6
SHA2566f9d36ac337f5c25237cff3e47d5a548d4b53b7d25aa21d4f3a04d0efa535f10
SHA5126b652a1cd8a33c75083bab8e29a0898e36e14ce54a06a1a3056a5028abfa642d0a2895f855dedee5c9a2470594fd6c70fc2012fc69cd596d2e42970b22f13c10
-
Filesize
88KB
MD5511d59db1ae82d82a68398e709d956cf
SHA1988bd34a93e85924c84afd6a483b1205c1a7e21a
SHA256cdfbb2365487a8ad5f0290cc02b756b7fea7b299fcf675ae61997bdaa7a62a73
SHA512157b4a483ec9a5d9ac94c21c499fd062b791e6d3fb53e84bf22f5695892b65dcfa2072559f685db307015210c3ed9a55a4595c4e504c48cfc8d51a4ad5082d68
-
Filesize
88KB
MD50fe08896fb179fa15d077fa8c28c6e99
SHA1880fc026444e1569de6f6e638703b642f48da4d3
SHA2566827a132a823345243d3abfeaa4323af37ba4a4e0e2040040c410050efdf481a
SHA512ad3b669537b0063dc375097651b24c44d99e952c00b4cc9df350947ba17c21511a30e8b1dafdb7fc5b89d1db21b1d3e69a8d84c52abed7e25e4c9e8c30f633f7